Search results for: context aware computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7339

Search results for: context aware computing

6919 Drivers of Adoption Intensity of Certified Maize Varieties in Northern Guinea Savannah of Nigeria: A Triple Hurdle Model Approach

Authors: Kalat P. Duniya

Abstract:

A number of technologies expected to increase maize productivity have been introduced by several research programs at national and international level. To this end, the study sought to identify the factors influencing adoption intensity of certified maize varieties. The data used were obtained from a sample household survey of 406 maize farmers, conducted in the northern guinea savannah of Nigeria through multistage stratified sampling, structured questionnaire. A triple hurdle model was adopted to estimate the determinants of adoption intensity; considering awareness, adoption, and intensity as three separate stages. The result showed that the drivers of farmers’ awareness, adoption, and intensity of usage may not necessarily be the same, and where they are, not of the same magnitude and direction. However, factors which were found to be statistically significant were age, education, membership of association and frequency of extension advice. In addition, awareness and adoption of the technologies were likely to be increased with male respondents. Farmers that were members of either community organizations or cooperative organizations had a higher tendency of being aware and adopting certified maize seed varieties. It was also discovered that though some of the farmers were fully aware of the existence of some certified maize varieties, majority lacked detailed knowledge and technical know-how. There is a need for creation of awareness through an excellent trained extension and restructuring of the educational sector to improve on the adoption process as well as improve maize productivity in the country.

Keywords: adoption, awareness, maize farmers, Nigeria, regression

Procedia PDF Downloads 174
6918 Distributed Actor System for Traffic Simulation

Authors: Han Wang, Zhuoxian Dai, Zhe Zhu, Hui Zhang, Zhenyu Zeng

Abstract:

In traditional microscopic traffic simulation, various approaches have been suggested to implement the single-agent behaviors about lane changing and intelligent driver model. However, when it comes to very large metropolitan areas, microscopic traffic simulation requires more resources and become time-consuming, then macroscopic traffic simulation aggregate trends of interests rather than individual vehicle traces. In this paper, we describe the architecture and implementation of the actor system of microscopic traffic simulation, which exploits the distributed architecture of modern-day cloud computing. The results demonstrate that our architecture achieves high-performance and outperforms all the other traditional microscopic software in all tasks. To the best of our knowledge, this the first system that enables single-agent behavior in macroscopic traffic simulation. We thus believe it contributes to a new type of system for traffic simulation, which could provide individual vehicle behaviors in microscopic traffic simulation.

Keywords: actor system, cloud computing, distributed system, traffic simulation

Procedia PDF Downloads 192
6917 Performance Evaluation of Parallel Surface Modeling and Generation on Actual and Virtual Multicore Systems

Authors: Nyeng P. Gyang

Abstract:

Even though past, current and future trends suggest that multicore and cloud computing systems are increasingly prevalent/ubiquitous, this class of parallel systems is nonetheless underutilized, in general, and barely used for research on employing parallel Delaunay triangulation for parallel surface modeling and generation, in particular. The performances, of actual/physical and virtual/cloud multicore systems/machines, at executing various algorithms, which implement various parallelization strategies of the incremental insertion technique of the Delaunay triangulation algorithm, were evaluated. T-tests were run on the data collected, in order to determine whether various performance metrics differences (including execution time, speedup and efficiency) were statistically significant. Results show that the actual machine is approximately twice faster than the virtual machine at executing the same programs for the various parallelization strategies. Results, which furnish the scalability behaviors of the various parallelization strategies, also show that some of the differences between the performances of these systems, during different runs of the algorithms on the systems, were statistically significant. A few pseudo superlinear speedup results, which were computed from the raw data collected, are not true superlinear speedup values. These pseudo superlinear speedup values, which arise as a result of one way of computing speedups, disappear and give way to asymmetric speedups, which are the accurate kind of speedups that occur in the experiments performed.

Keywords: cloud computing systems, multicore systems, parallel Delaunay triangulation, parallel surface modeling and generation

Procedia PDF Downloads 206
6916 A Case Study in Using Gamification in the Mobile Computing Course

Authors: Rula Al Azawi, Abobaker Shafi

Abstract:

The purpose of this paper is to use gamification technology in the mobile computing course to increase students motivation and engagement. The game applied to be designed by students focusing also to design educational game for children with age six years. This game will teach the students how to learn in a fun way. Our case study is implemented at Gulf College which is affiliated with Staffordshire University-UK. Our game design was applied to teach students Android Studio software by designing an educational game. Our goal with gamification is to improve student attendance, increase student engagement, problem solving and user stratification. Finally, we describe the findings and results of our case study. The data analysis and evaluation are based on students feedback, staff feedback and the final marking grades for the students.

Keywords: gamification, educational game, android studio software, students motivation and engagement

Procedia PDF Downloads 455
6915 Object Negotiation Mechanism for an Intelligent Environment Using Event Agents

Authors: Chiung-Hui Chen

Abstract:

With advancements in science and technology, the concept of the Internet of Things (IoT) has gradually developed. The development of the intelligent environment adds intelligence to objects in the living space by using the IoT. In the smart environment, when multiple users share the living space, if different service requirements from different users arise, then the context-aware system will have conflicting situations for making decisions about providing services. Therefore, the purpose of establishing a communication and negotiation mechanism among objects in the intelligent environment is to resolve those service conflicts among users. This study proposes developing a decision-making methodology that uses “Event Agents” as its core. When the sensor system receives information, it evaluates a user’s current events and conditions; analyses object, location, time, and environmental information; calculates the priority of the object; and provides the user services based on the event. Moreover, when the event is not single but overlaps with another, conflicts arise. This study adopts the “Multiple Events Correlation Matrix” in order to calculate the degree values of incidents and support values for each object. The matrix uses these values as the basis for making inferences for system service, and to further determine appropriate services when there is a conflict.

Keywords: internet of things, intelligent object, event agents, negotiation mechanism, degree of similarity

Procedia PDF Downloads 290
6914 A New Method to Reduce 5G Application Layer Payload Size

Authors: Gui Yang Wu, Bo Wang, Xin Wang

Abstract:

Nowadays, 5G service-based interface architecture uses text-based payload like JSON to transfer business data between network functions, which has obvious advantages as internet services but causes unnecessarily larger traffic. In this paper, a new 5G application payload size reduction method is presented to provides the mechanism to negotiate about new capability between network functions when network communication starts up and how 5G application data are reduced according to negotiated information with peer network function. Without losing the advantages of 5G text-based payload, this method demonstrates an excellent result on application payload size reduction and does not increase the usage quota of computing resource. Implementation of this method does not impact any standards or specifications and not change any encoding or decoding functionality too. In a real 5G network, this method will contribute to network efficiency and eventually save considerable computing resources.

Keywords: 5G, JSON, payload size, service-based interface

Procedia PDF Downloads 180
6913 Memorabilia of Suan Sunandha through Interactive User Interface

Authors: Nalinee Sophatsathit

Abstract:

The objectives of memorabilia of Suan Sunandha are to develop a general knowledge presentation about the historical royal garden through interactive graphic simulation technique and to employ high-functionality context in enhancing interactive user navigation. The approach infers non-intrusive display of relevant history in response to situational context. User’s navigation runs through the virtual reality campus, consisting of new and restored buildings. A flash back presentation of information pertaining to the history in the form of photos, paintings, and textual descriptions are displayed along each passing-by building. To keep the presentation lively, graphical simulation is created in a serendipity game play so that the user can both learn and enjoy the educational tour. The benefits of this human-computer interaction development are two folds. First, lively presentation technique and situational context modeling are developed that entail a usable paradigm of knowledge and information presentation combinations. Second, cost effective training and promotion for both internal personnel and public visitors to learn and keep informed of this historical royal garden can be furnished without the need for a dedicated public relations service. Future improvement on graphic simulation and ability based display can extend this work to be more realistic, user-friendly, and informative for all.

Keywords: interactive user navigation, high-functionality context, situational context, human-computer interaction

Procedia PDF Downloads 356
6912 Integration of Internet-Accessible Resources in the Field of Mobile Robots

Authors: B. Madhevan, R. Sakkaravarthi, R. Diya

Abstract:

The number and variety of mobile robot applications are increasing day by day, both in an industry and in our daily lives. First developed as a tool, nowadays mobile robots can be integrated as an entity in Internet-accessible resources. The present work is organized around four potential resources such as cloud computing, Internet of things, Big data analysis and Co-simulation. Further, the focus relies on integrating, analyzing and discussing the need for integrating Internet-accessible resources and the challenges deriving from such integration, and how these issues have been tackled. Hence, the research work investigates the concepts of the Internet-accessible resources from the aspect of the autonomous mobile robots with an overview of the performances of the currently available database systems. IaR is a world-wide network of interconnected objects, can be considered an evolutionary process in mobile robots. IaR constitutes an integral part of future Internet with data analysis, consisting of both physical and virtual things.

Keywords: internet-accessible resources, cloud computing, big data analysis, internet of things, mobile robot

Procedia PDF Downloads 388
6911 A Timed and Colored Petri Nets for Modeling and Verify Cloud System Elasticity

Authors: Walid Louhichi, Mouhebeddine Berrima, Narjes Ben Rajed

Abstract:

Elasticity is the essential property of cloud computing. As the name suggests, it constitutes the ability of a cloud system to adjust resource provisioning in relation to fluctuating workload. There are two types of elasticity operations, vertical and horizontal. In this work, we are interested in horizontal scaling, which is ensured by two mechanisms; scaling in and scaling out. Following the sizing of the system, we can adopt scaling in in the event of over-supply and scaling out in the event of under-supply. In this paper, we propose a formal model, based on colored and temporized Petri nets, for the modeling of the duplication and the removal of a virtual machine from a server. This model is based on formal Petri Nets modeling language. The proposed models are edited, verified, and simulated with two examples implemented in CPNtools, which is a modeling tool for colored and timed Petri nets.

Keywords: cloud computing, elasticity, elasticity controller, petri nets, scaling in, scaling out

Procedia PDF Downloads 154
6910 Cultural Consciousness in an Art Museum: A Case Study of Museum of Modern and Contemporary Art in Nusantara in Indonesia

Authors: Pin-Hua Chou

Abstract:

MACAN (Museum of Modern and Contemporary Art in Nusantara) is a new private art museum in Jakarta, Indonesia. Facing challenges of rapidly changing social, cultural environments, MACAN is responding by devoting themselves to not only presenting famous international artists but also constructing the context of artists from Indonesia by interdisciplinary education and cultural exchange. This paper discusses the exhibitions, collections and the activities of MACAN. The purpose of this museum is to make people aware of the dialogue between local and international artist, and also Indonesia’s own art history. Yet how they build up the cultural consciousness for their audience inside and outside Indonesia? What strategy or method do they adapt to enhance general understanding of their own history and the relation between Indonesia and the world through their exhibition? MACAN has tried to convey their mission by every action they took since its opening (2017). The discussion begins with the premise that the initiative of MACAN offers us a new vision to better understand how a modern and contemporary art museum can make an effort to connect art with cultural identity and stimulate the awareness of recognition in Indonesia. This paper will adopt a case study, curator interview, and document analysis. Last but not least, the paper seeks to contribute towards the narrative of its first exhibition Art Turns, World Turns, Exploring the collection of the MACAN, as well as the possibility of raising audience’s cultural consciousness by a variety of public programs.

Keywords: contemporary art museum, challenges for art museum curators today, culture heritage, museum collections and exhibitions

Procedia PDF Downloads 198
6909 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 379
6908 Optimizing Availability of Marine Knowledge Repository with Cloud-Based Framework

Authors: Ahmad S. Mohd Noor, Emma A. Sirajudin, Nur F. Mat Zain

Abstract:

Reliability is an important property for knowledge repository system. National Marine Bioinformatics System or NABTICS is a marine knowledge repository portal aimed to provide a baseline for marine biodiversity and a tool for researchers and developers. It is intended to be a large and growing online database and also a metadata system for inputs of research analysis. The trends of present large distributed systems such as Cloud computing are the delivery of computing as a service rather than a product. The goal of this research is to make NABTICS a system of greater availability by integrating it with Cloud based Neighbor Replication and Failure Recovery (NRFR). This can be achieved by implementation of NABTICS into distributed environment. As a result, the user can experience minimum downtime while using the system should the server is having a failure. Consequently the online database application is said to be highly available.

Keywords: cloud, availability, distributed system, marine repository, database replication

Procedia PDF Downloads 471
6907 A Parallel Algorithm for Solving the PFSP on the Grid

Authors: Samia Kouki

Abstract:

Solving NP-hard combinatorial optimization problems by exact search methods, such as Branch-and-Bound, may degenerate to complete enumeration. For that reason, exact approaches limit us to solve only small or moderate size problem instances, due to the exponential increase in CPU time when problem size increases. One of the most promising ways to reduce significantly the computational burden of sequential versions of Branch-and-Bound is to design parallel versions of these algorithms which employ several processors. This paper describes a parallel Branch-and-Bound algorithm called GALB for solving the classical permutation flowshop scheduling problem as well as its implementation on a Grid computing infrastructure. The experimental study of our distributed parallel algorithm gives promising results and shows clearly the benefit of the parallel paradigm to solve large-scale instances in moderate CPU time.

Keywords: grid computing, permutation flow shop problem, branch and bound, load balancing

Procedia PDF Downloads 283
6906 Rethinking Urban Green Space Quality and Planning Models from Users and Experts’ Perspective for Sustainable Development: The Case of Debre Berhan and Debre Markos Cities, Ethiopia

Authors: Alemaw Kefale, Aramde Fetene, Hayal Desta

Abstract:

This study analyzed the users' and experts' views on the green space quality and planning models in Debre Berhan (DB) and Debre Markos (DM) cities in Ethiopia. A questionnaire survey was conducted on 350 park users (148 from DB and 202 from DM) to rate the accessibility, size, shape, vegetation cover, social and cultural context, conservation and heritage, community participation, attractiveness, comfort, safety, inclusiveness, and maintenance of green spaces using a Likert scale. A key informant interview was held with 13 experts in DB and 12 in DM. Descriptive statistics and tests of independence of variables using the chi-square test were done. A statistically significant association existed between the perception of green space quality attributes and users' occupation (χ² (160, N = 350) = 224.463, p < 0.001), age (χ² (128, N = 350) = 212.812, p < 0.001), gender (χ² (32, N = 350) = 68.443, p < 0.001), and education level (χ² (192, N = 350) = 293.396, p < 0.001). 61.7 % of park users were unsatisfied with the quality of urban green spaces. The users perceived dense vegetation cover as "good," with a mean value of 3.41, while the remaining were perceived as "medium with a mean value of 2.62 – 3.32". Only quantitative space standards are practiced as a green space planning model, while other models are unfamiliar and never used in either city. Therefore, experts need to be aware of and practice urban green models during urban planning to ensure that new developments include green spaces to accommodate the community's and the environment's needs.

Keywords: urban green space, quality, users and experts, green space planning models, Ethiopia

Procedia PDF Downloads 58
6905 A TiO₂-Based Memristor Reliable for Neuromorphic Computing

Authors: X. S. Wu, H. Jia, P. H. Qian, Z. Zhang, H. L. Cai, F. M. Zhang

Abstract:

A bipolar resistance switching behaviour is detected for a Ti/TiO2-x/Au memristor device, which is fabricated by a masked designed magnetic sputtering. The current dependence of voltage indicates the curve changes slowly and continuously. When voltage pulses are applied to the device, the set and reset processes maintains linearity, which is used to simulate the synapses. We argue that the conduction mechanism of the device is from the oxygen vacancy channel model, and the resistance of the device change slowly due to the reaction between the titanium electrode and the intermediate layer and the existence of a large number of oxygen vacancies in the intermediate layer. Then, Hopfield neural network is constructed to simulate the behaviour of neural network in image processing, and the accuracy rate is more than 98%. This shows that titanium dioxide memristor has a broad application prospect in high performance neural network simulation.

Keywords: memristor fabrication, neuromorphic computing, bionic synaptic application, TiO₂-based

Procedia PDF Downloads 89
6904 Virtual Computing Lab for Phonics Development among Deaf Students

Authors: Ankita R. Bansal, Naren S. Burade

Abstract:

Idea is to create a cloud based virtual lab for Deaf Students, “A language acquisition program using Visual Phonics and Cued Speech” using VMware Virtual Lab. This lab will demonstrate students the sounds of letters associated with the Language, building letter blocks, making words, etc Virtual labs are used for demos, training, for the Lingual development of children in their vernacular language. The main potential benefits are reduced labour and hardware costs, faster response times to users. Virtual Computing Labs allows any of the software as a service solutions, virtualization solutions, and terminal services solutions available today to offer as a service on demand, where a single instance of the software runs on the cloud and services multiple end users. VMWare, XEN, MS Virtual Server, Virtuoso, and Citrix are typical examples.

Keywords: visual phonics, language acquisition, vernacular language, cued speech, virtual lab

Procedia PDF Downloads 599
6903 Patient’s Knowledge and Use of Sublingual Glyceryl Trinitrate Therapy in Taiping Hospital, Malaysia

Authors: Wan Azuati Wan Omar, Selva Rani John Jasudass, Siti Rohaiza Md. Saad

Abstract:

Introduction & objective: The objectives of this study were to assess patient’s knowledge of appropriate sublingual glyceryl trinitrate (GTN) use as well as to investigate how patients commonly store and carry their sublingual GTN tablets. Methodology: This was a cross-sectional survey, using a validated researcher-administered questionnaire. The study involved cardiac patients receiving sublingual GTN attending the outpatient and inpatient departments of Taiping Hospital, a non-academic public care hospital. The minimum calculated sample size was 92, but 100 patients were conveniently sampled. Respondents were interviewed on 3 areas, including demographic data, knowledge and use of sublingual GTN. Eight items were used to calculate each subject’s knowledge score and six items were used to calculate use score. Results: Of the 96 patients who consented to participate, majority (96.9%) were well aware of the indication of sublingual GTN. With regards to the mechanism of action of sublingual GTN, 73 (76%) patients did not know how the medication works. Majority of the patients (66.7%) knew about the proper storage of the tablet. In relation to the maximum number of sublingual GTN tablets that can be taken during each angina episode, 36.5% did not know that up to 3 tablets of sublingual GTN can be taken during each episode of angina. Fifty four (56.2%) patients were not aware that they need to replace sublingual GTN every 8 weeks after receiving the tablets. Majority (69.8%) of the patients demonstrated lack of knowledge with regards to the use of sublingual GTN as prevention of chest pain. Conclusion: Overall, patients’ knowledge regarding the self administration of sublingual GTN is still inadequate. The findings support the need for more frequent reinforcement of patient education, especially in the areas of preventive use, storage and drug stability.

Keywords: glyceryl trinitrate, knowledge, adherence, patient education

Procedia PDF Downloads 397
6902 Social and Psychological Contexts of Male-Perpetrators of Violence against Women

Authors: Mythri Kukkaje

Abstract:

Information about the social and psychological contexts that operate as a breeding ground for perpetrators of violence against women in India is scarce. To understand the social and psychological contexts that form the bases of violent behaviour in male-perpetrators against women, interviews were conducted with 13 men above the age of 18 years, who were convicted for their crimes against women. Using thematic analysis, the nurturance and the social background of the perpetrators, determined by their social relationships, the socio-economic status, the extent of substance abuse, the history of experiencing and witnessing violence and their cultural context, were found to define the social context. The nature and the psychological background of the perpetrators determined by the thoughts and beliefs regarding gender and violence, the motivation behind their violent behaviour and a few specific personality traits were found to define the psychological context. These factors on their own, as well as an interaction between them, could be responsible for varying degrees of violence against women.

Keywords: perpetrator, psychological, social, violence against women

Procedia PDF Downloads 227
6901 Knowledge Based Automated Software Engineering Platform Used for the Development of Bulgarian E-Customs

Authors: Ivan Stanev, Maria Koleva

Abstract:

Described are challenges to the Bulgarian e-Customs (BeC) related to low level of interoperability and standardization, inefficient use of available infrastructure, lack of centralized identification and authorization, extremely low level of software process automation, and insufficient quality of data stored in official registers. The technical requirements for BeC are prepared with a focus on domain independent common platform, specialized customs and excise components, high scalability, flexibility, and reusability. The Knowledge Based Automated Software Engineering (KBASE) Common Platform for Automated Programming (CPAP) is selected as an instrument covering BeC requirements for standardization, programming automation, knowledge interpretation and cloud computing. BeC stage 3 results are presented and analyzed. BeC.S3 development trends are identified.

Keywords: service oriented architecture, cloud computing, knowledge based automated software engineering, common platform for automated programming, e-customs

Procedia PDF Downloads 371
6900 Inspiring Woman: The Emotional Intelligence Leadership of Khadijah Bint Khuwaylid

Authors: Eman S. Soliman, Sana Hawamdeh, Najmus S. Mahfooz

Abstract:

Purpose: The purpose of this paper was to examine various components of applied emotional intelligence as demonstrated in the leadership style of Khadijah Bint Khuwaylid in pre and post-Islamic society. Methodology: The research used a qualitative research method, specifically historical and ethnographic techniques. Data collection included both primary and secondary sources. Data from sources were analyzed to document the use of emotional intelligent leadership behaviors throughout Khadijah Bint Khuwaylid leadership experience from 596 A.D. to 621 A.D. Findings: Demonstration of four cornerstones of emotional intelligence which are self-awareness, self-management, social awareness and relationship management. Apply them on khadejah Bint Khuwaylid leadership style reveal that she possess main behavioral competences in the form of emotionally self-aware, self-.confidence, adaptability, empathy and influence. Conclusions: Khadijah Bint Khuwaylid serves as a historical model of effective leadership that included the use of emotional intelligence in her leadership behavior. The inclusion of the effective portion of the brain created a successful leadership style that can be learned by present day and future leadership. The recommendations for future leaders are to include the use of emotionally self-aware and self-confidence, adaptability, empathy and influence as components of leadership. This will then demonstrate in a leadership a basic knowledge and understanding of feelings, the keenness to be emotionally open with others, the ability to prototype beliefs and values, and the use of emotions in future communications, vision and progress.

Keywords: emotional intelligence, leadership, Khadijah Bint Khuwaylid, women

Procedia PDF Downloads 276
6899 Model and Algorithm for Dynamic Wireless Electric Vehicle Charging Network Design

Authors: Trung Hieu Tran, Jesse O'Hanley, Russell Fowler

Abstract:

When in-wheel wireless charging technology for electric vehicles becomes mature, a need for such integrated charging stations network development is essential. In this paper, we thus investigate the optimisation problem of in-wheel wireless electric vehicle charging network design. A mixed-integer linear programming model is formulated to solve into optimality the problem. In addition, a meta-heuristic algorithm is proposed for efficiently solving large-sized instances within a reasonable computation time. A parallel computing strategy is integrated into the algorithm to speed up its computation time. Experimental results carried out on the benchmark instances show that our model and algorithm can find the optimal solutions and their potential for practical applications.

Keywords: electric vehicle, wireless charging station, mathematical programming, meta-heuristic algorithm, parallel computing

Procedia PDF Downloads 79
6898 Second Language Acquisition in a Study Abroad Context: International Students’ Perspectives of the Evolution of Their ‘Second Language Self’

Authors: Dianah Kitiabi

Abstract:

This study examines the experiences of graduate international students in Study Abroad (SA) in order to understand the evolution of their second language (L2) skills during the period of their sojourn abroad. The study documents students’ perspectives through analysis of interview data situated within the context of their overall SA experience. Based on a phenomenological approach, the study focuses on a sample of nine graduate students with at least one year of SA experience. Gass & Mackey’s (2007) interaction approach and Vygotsky’s (1962) sociocultural theory help frame the study within the discourse of second language acquisition (SLA) in SA, such as to highlight the effects of SA on L2 skills of advanced-level learners. The findings of the study are first presented as individual case vignettes where students’ interpretations of their personal experiences are described in entirety, followed by an analysis across the cases that highlight emergent themes. The results of this study show that the linguistic outcomes of international students studying abroad are highly individualized. Although students reported to have improved some of their L2 skills, they also reported a lack of improvement in other L2 skills, most of which differed by case. What emerges is that besides contextual factors, students’ pre-program exposure to L2, interactions with NSs, frequency of L2 use in context, and personal beliefs contribute to their linguistic gains in SA.

Keywords: context, interaction, second language acquisition, study abroad

Procedia PDF Downloads 79
6897 Assessment of the Use of Participatory Research Methods among Researchers in Federal University of Agriculture Abeokuta, Nigeria

Authors: Samson Olusegun Apantaku, Adetayo K. Aromolaran, Giyatt Hammed

Abstract:

The study assessed the use of participatory research methods among Federal University of Agriculture Abeokuta, Nigeria (FUNAAB) researchers. Simple random sampling technique was used to select one hundred and twenty respondents from the study area. Data were collected using a questionnaire. Data collected were subjected to descriptive and inferential statistical analyses. Results showed that 75.8% of the respondents were males while only 21.3% were female. The mean age of the respondents was 38.8 years and most (77.5%) of them were married. 15% of the respondents were in professorial cadre, 21.7% and 20% of the respondents were senior lecturers/fellow and lecturer/research fellow I&II respectively. The results further revealed that 93.3% of the respondents were aware of participatory research methods and 82.5% of the respondents have utilized it before. The average period of usage was 2.7 years and participation by consultation (86.7%) and interactive participation (76.7%) were mostly used. Most (94.2%) indicated that fund was the major hindrance to the use of participatory research methods. The result of correlation analysis showed that there was significant relationship between the years of research experience, designation post (status) of the respondents and usage of participatory research methods (r = 0.034, 0.031, p < 0.05). The study concluded that most of the researchers were aware of and used participatory research methods, which could influence the quality of their research or make it acceptable to the end users. It was recommended that more funds should be made available and accessible for participatory research. All researchers should be trained and encouraged to make use of participatory research methods in their research activities so as to achieve effective research and capacity building that could enhance adoption of technologies and increase agricultural production in the country. Farmers’ capacity to participate in agricultural research should also be enhanced.

Keywords: participatory research, participatory research methods, awareness, utilization

Procedia PDF Downloads 419
6896 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework

Authors: Mayada Al Meghari

Abstract:

Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.

Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance

Procedia PDF Downloads 119
6895 The Role of Context in Interpreting Emotional Body Language in Robots

Authors: Jekaterina Novikova, Leon Watts

Abstract:

In the emerging world of human-robot interaction, people and robots will interact socially in real-world situations. This paper presents the results of an experimental study probing the interaction between situational context and emotional body language in robots. 34 people rated video clips of robots performing expressive behaviours in different situational contexts both for emotional expressivity on Valence-Arousal-Dominance dimensions and by selecting a specific emotional term from a list of suggestions. Results showed that a contextual information enhanced a recognition of emotional body language of a robot, although it did not override emotional signals provided by robot expressions. Results are discussed in terms of design guidelines on how an emotional body language of a robot can be used by roboticists developing social robots.

Keywords: social robotics, non-verbal communication, situational context, artificial emotions, body language

Procedia PDF Downloads 289
6894 Investigating University Language Teacher’s Perception of Their Identities in the Algerian Multilingual Context

Authors: Yousra Drissi

Abstract:

This research explores language teacher identity in a multilingual context where both teachers and students come from different linguistic backgrounds. It seeks to understand how teachers perceive themselves as language teachers in this context in relation to different influencing factors, both internal and external. This study is being conducted due to the importance of language teacher identity (LTI) in the university context, which is being neglected in the present literature (in an attempt to address the gap in the present literature). The broader aim of this study is to bring attention to language teacher identity along with the different influencing elements which can either promote or hinder its development. In this research, we are using the sociocultural theory and post-structural theory. This research uses the mixed methods approach to collect and analyse relevant data. A structured survey was distributed to language teachers from different universities around Algeria, followed by in-depth interviews. Results are supposed to show the different points in self-perception that these teachers share or differ in. they will also help us identify the different internal and external factors that can be of influence. However, the results of this research can be used by institutions as well as decision-makers to better understand university teachers and help them improve their teaching practices by empowering their language teacher identity, starting from teacher education programs to continuous teacher development programs.

Keywords: identity, language teacher identity, multilingualism, university teacher

Procedia PDF Downloads 77
6893 Pervasive Computing: Model to Increase Arable Crop Yield through Detection Intrusion System (IDS)

Authors: Idowu Olugbenga Adewumi, Foluke Iyabo Oluwatoyinbo

Abstract:

Presently, there are several discussions on the food security with increase in yield of arable crop throughout the world. This article, briefly present research efforts to create digital interfaces to nature, in particular to area of crop production in agriculture with increase in yield with interest on pervasive computing. The approach goes beyond the use of sensor networks for environmental monitoring but also by emphasizing the development of a system architecture that detect intruder (Intrusion Process) which reduce the yield of the farmer at the end of the planting/harvesting period. The objective of the work is to set a model for setting up the hand held or portable device for increasing the quality and quantity of arable crop. This process incorporates the use of infrared motion image sensor with security alarm system which can send a noise signal to intruder on the farm. This model of the portable image sensing device in monitoring or scaring human, rodent, birds and even pests activities will reduce post harvest loss which will increase the yield on farm. The nano intelligence technology was proposed to combat and minimize intrusion process that usually leads to low quality and quantity of produce from farm. Intranet system will be in place with wireless radio (WLAN), router, server, and client computer system or hand held device e.g PDAs or mobile phone. This approach enables the development of hybrid systems which will be effective as a security measure on farm. Since, precision agriculture has developed with the computerization of agricultural production systems and the networking of computerized control systems. In the intelligent plant production system of controlled greenhouses, information on plant responses, measured by sensors, is used to optimize the system. Further work must be carry out on modeling using pervasive computing environment to solve problems of agriculture, as the use of electronics in agriculture will attracts more youth involvement in the industry.

Keywords: pervasive computing, intrusion detection, precision agriculture, security, arable crop

Procedia PDF Downloads 403
6892 Communication of Sensors in Clustering for Wireless Sensor Networks

Authors: Kashish Sareen, Jatinder Singh Bal

Abstract:

The use of wireless sensor networks (WSNs) has grown vastly in the last era, pointing out the crucial need for scalable and energy-efficient routing and data gathering and aggregation protocols in corresponding large-scale environments. Wireless Sensor Networks have now recently emerged as a most important computing platform and continue to grow in diverse areas to provide new opportunities for networking and services. However, the energy constrained and limited computing resources of the sensor nodes present major challenges in gathering data. The sensors collect data about their surrounding and forward it to a command centre through a base station. The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) as they are very useful in target detecting and other applications. However, hierarchical clustering protocols have maximum been used in to overall system lifetime, scalability and energy efficiency. In this paper, the state of the art in corresponding hierarchical clustering approaches for large-scale WSN environments is shown.

Keywords: clustering, DLCC, MLCC, wireless sensor networks

Procedia PDF Downloads 481
6891 Global Healthcare Village Based on Mobile Cloud Computing

Authors: Laleh Boroumand, Muhammad Shiraz, Abdullah Gani, Rashid Hafeez Khokhar

Abstract:

Cloud computing being the use of hardware and software that are delivered as a service over a network has its application in the area of health care. Due to the emergency cases reported in most of the medical centers, prompt for an efficient scheme to make health data available with less response time. To this end, we propose a mobile global healthcare village (MGHV) model that combines the components of three deployment model which include country, continent and global health cloud to help in solving the problem mentioned above. In the creation of continent model, two (2) data centers are created of which one is local and the other is global. The local replay the request of residence within the continent, whereas the global replay the requirements of others. With the methods adopted, there is an assurance of the availability of relevant medical data to patients, specialists, and emergency staffs regardless of locations and time. From our intensive experiment using the simulation approach, it was observed that, broker policy scheme with respect to optimized response time, yields a very good performance in terms of reduction in response time. Though, our results are comparable to others when there is an increase in the number of virtual machines (80-640 virtual machines). The proportionality in increase of response time is within 9%. The results gotten from our simulation experiments shows that utilizing MGHV leads to the reduction of health care expenditures and helps in solving the problems of unqualified medical staffs faced by both developed and developing countries.

Keywords: cloud computing (MCC), e-healthcare, availability, response time, service broker policy

Procedia PDF Downloads 377
6890 Driving Mechanism of Urban Sprawl in Chinese Context from the Perspective of Domestic and Overseas Comparison

Authors: Tingke Wu, Yaping Huang

Abstract:

Many cities in China have been experiencing serious urban sprawl since the 1980s, which pose great challenges to a country with scare cultivated land and huge population. Because of different social and economic context and development stage, driving forces of urban sprawl in China are quite different from developed countries. Therefore, it is of great importance to probe into urban sprawl driving mechanism in Chinese context. By a comparison study of the background and features of urban sprawl between China and developed countries, this research establishes an analytical framework for sprawl dynamic mechanism in China. By literature review and analyzing data from national statistical yearbook, it then probes into the driving mechanism and the primary cause of urban sprawl. The results suggest that population increase, economic growth, traffic and information technology development lead to rapid expansion of urban space; defects of land institution and lack of effective guidance give rise to low efficiency of urban land use. Moreover, urban sprawl is ultimately attributed to imperfections of policy and institution. On this basis, this research puts forward several sprawl control strategies in Chinese context.

Keywords: China, driving forces, driving mechanism, land institution, urban expansion, urban sprawl

Procedia PDF Downloads 179